Chained of things: A secure and dependable design of autonomous vehicle services MGMM Hasan, A Datta, MA Rahman, H Shahriar 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC …, 2018 | 30 | 2018 |
Cyber threat analysis framework for the wind energy based power system A Datta, MA Rahman Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and …, 2017 | 14 | 2017 |
Impact of stealthy attacks on optimal power flow: A simulink-driven formal analysis MA Rahman, A Datta IEEE Transactions on Dependable and Secure Computing 17 (3), 451-464, 2018 | 13 | 2018 |
Optimal deployment of charging stations for electric vehicles: A formal approach A Datta, BK Ledbetter, MA Rahman 2017 IEEE 37th international conference on distributed computing systems …, 2017 | 9 | 2017 |
Security design against stealthy attacks on power system state estimation: A formal approach MA Rahman, A Datta, E Al-Shaer Computers & security 84, 301-317, 2019 | 6 | 2019 |
Automated configuration synthesis for resilient smart metering infrastructure M Rahman, A Datta, E Al-Shaer EAI Endorsed Transactions on Security and Safety 8 (28), 2021 | 3 | 2021 |
Automated synthesis of resiliency configurations for cyber networks MA Rahman, A Farooq, A Datta, E Al-Shaer 2016 IEEE Conference on Communications and Network Security (CNS), 243-251, 2016 | 3 | 2016 |
WTC^ 2: Impact-Aware Threat Analysis for Water Treatment Centers A Datta, MA Rahman, H Shahriar 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 2 | 2020 |
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory MA Rahman, A Datta | | 2018 |